Skip to main content
Log in

Efficient RNTS system for privacy of banking off-line customer

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because individual identification is important in ubiquitous environment, RFID technology would be used frequently. RFID is a radio frequency identification technology to replace bar code. The reader transmits query (request of user information) and tag-provides user information. RFID has various advantages, such as high speed identification rates, mass memory storages. However, eavesdropping is possible as well as a problem that user information is exposed (Juels et al. in Conference on Computer and Communications Security—ACM CCS, pp. 103–111, 2003; Ohkubo et al. in RFID Privacy Workshop 2003; Weis et al. in International Conference on Security in Pervasive Computing, pp. 201–212, 2003; Weis et al. in Cryptographic Hardware and Embedded Systems—CHES, pp. 454–469, 2002). Therefore, when off-line customer had visited bank for banking service, RNTS (RFID number ticket service) system provides both anonymity in customer identification and efficiency of banking service. In addition, RNTS system protects privacy of an off-line user visiting the bank and it is an efficient method offering service in order of arriving in the bank.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Juels A, Revest, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: Conference on computer and communications security-ACM CCS, pp 103–111

  2. Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to ‘privacy-friendly’ tags. In: RFID Privacy Workshop

  3. Weis S, Sarma S, Rivest R, Engels D (2003) Security and privacy aspects of low-cost radio frequency identification systems. In: International conference on security in pervasive computing, pp 201–212

  4. Weis S, Sarma S, Engels D (2002) RFID systems and security and privacy implications. In: Cryptographic hardware and embedded systems-CHES, pp 454–469

  5. Vajda I, Buttyan L (2003) Lightweight authentication protocols for low-cost RFID tags. In: UBICOMP 2003

  6. Weis S, Sarma S, Rivest R, Engels D (2003) Security and privacy aspects of low-cost radio frequency identification systems. In: International conference on security in pervasive computing, pp 201–212

  7. Henrici D, Mullerm P (2004) Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Workshop on pervasive computing and communications security—PerSec, pp 219–224

  8. Hwang Y-J, Lee S-M, Lee DH, Lim JI (2004) Low-cost RFID authentication protocol in ubiquitous environment. In: Conference on information security and cryptology—Summer, vol 14, no 1, pp 109–114

  9. Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. In: Encrypt workshop

  10. Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, Ribagorda A (2006) EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In: OTM federated conferences and workshop: IS workshop

  11. Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, Ribagorda A (2006) LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID security

  12. Peris-Lopez P, Hernandez-Castro J, Estevez-Tapiador J, Ribagorda A (2006) M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: International conference on ubiquitous intelligence and computing—UIC 2006

  13. Weis S (2003) Security and privacy in radio-frequency identification devices. Masters thesis

  14. Weis S, Sarma S, Engels D (2002) RFID systems and security and privacy implications. In: Cryptographic hardware and embedded systems—CHES, pp 454–469

  15. Yoo SH, Kim K, Hwang YH, Lee PJ (2004) Status-based RFID authentication protocol. J Korea Inst Inf Secur Cryptol 14(6):57–68

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwang Seon Ahn.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jeong, C.H., Ahn, K.S. Efficient RNTS system for privacy of banking off-line customer. J Supercomput 55, 307–319 (2011). https://doi.org/10.1007/s11227-009-0346-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-009-0346-x

Navigation